Enhancing Cold Wallet Security with Native Multi-Signature schemes in Centralized Exchanges

10/01/2021
by   Shahriar Ebrahimi, et al.
0

Currently, one of the most widely used protocols to secure cryptocurrency assets in centralized exchanges is categorizing wallets into cold and hot. While cold wallets hold user deposits, hot wallets are responsible for addressing withdrawal requests. However, this method has some shortcomings such as: 1) availability of private keys in at least one cold device, and 2) exposure of all private keys to one trusted cold wallet admin. To overcome such issues, we design a new protocol for managing cold wallet assets by employing native multi-signature schemes. The proposed cold wallet system, involves at least two distinct devices and their corresponding admins for both wallet creation and signature generation. The method ensures that no final private key is stored on any device. To this end, no individual authority can spend from exchange assets. Moreover, we provide details regarding practical implementation of the proposed method and compare it against state-of-the-art. Furthermore, we extend the application of the proposed method to an scalable scenario where users are directly involved in wallet generation and signing process of cold wallets in an MPC manner.

READ FULL TEXT

page 1

page 3

page 5

page 6

page 9

page 11

research
07/09/2019

Private key encryption and recovery in blockchain

The disruptive technology of blockchain can deliver secure solutions wit...
research
04/23/2018

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

Personal cryptographic keys are the foundation of many secure services, ...
research
07/08/2020

Threshold ECDSA with an Offline Recovery Party

A (t,n)- threshold signature scheme enables distributed signing among n ...
research
06/21/2021

Improving security for users of decentralized exchanges through multiparty computation

Decentralized cryptocurrency exchanges offer compelling security benefit...
research
07/19/2022

Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight

Public key infrastructure (PKI) is a certificate-based technology that h...
research
10/16/2018

Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

We propose a Fourier domain asymmetric cryptosystem for multimodal biome...
research
06/13/2023

Decentralizing Custodial Wallets with MFKDF

The average cryptocurrency user today faces a difficult choice between c...

Please sign up or login with your details

Forgot password? Click here to reset